SEARCH KEYWORD -- USER RESEARCH



  Meta tag in HTML header

In server response, we can use response.setHeader() to set the meta information in header of a HTML page. The usage is response.setHeader(name,context); meta is used to simulate the response header of HTTP protocol in HTML page. It should be put between the <head> and </head> tag. 1. <meta name="Generator" content="" > <!--This is to specify the tool which generates this page such as Microsoft FrontPage 4.0 etc --> 2. <meta name="keywords" content=""> <!-- To tel...

   HTTP,meta,HTML,head     2013-05-22 11:34:08

  Apple will shut down Ping on 30th September

What? Apple also has social networks! Yes. Unfortunately, you just heard it and it is to be shut down. In fact, Apple launched Ping not too long ago, in September 2010, it was released together with iTunes 10.Ping allows users to share with your friends the music you are listening to, and you can even share concerts and activities information, and it supports for picture and link sharing. In addition, Ping also includes the "Top Ten" list of features that can be customized, each singer and the ...

   Apple,Ping,Social network     2012-09-12 22:21:31

  OpenLDAP Proxy -- Introduction

OpenLDAP is an open source project which is intended to provide some commercial-grade, fully featured applications and development tools based on the well known Light-weight Directory Access Protocol(LDAP). Hence corporations which want to manage their user and group information can freely use these tools.  OpenLDAP provides ldap servers, ldap clients and corresponding tools to work on LDAP. The LDAP server is called slapd(Stand-alone LDAP  daemon). And it would serve as the server whi...

   META,OPENLDAP,OPENLDAP PROXY,SLAPD,SLAPD.CONF,LDAP     2017-10-28 11:20:00

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  Configure static IP for Linux

When a Linux server is running, it has to have an IP so that other machines can talk to it. It is often desired that the server would own a static IP so that every time other machines want to connect to it, the same IP address would be used. This is extremely useful when there are virtual machines installed on a host machine where the virtual machine would start and stop now and then.  To configure static IP address for a Linux server, the /etc/network/interfaces needs to be updated. Assumi...

   LINUX,NETWORK,STATIC IP,DNS     2017-07-08 08:39:58

  3 Mistakes Website Owners Must Avoid to Enjoy SEO Success

The first thing a consumer asks themselves when they enter any website/webpage is whether they should stay or not. A consumer has just a few seconds during which, you have a chance to capture and retain them or else they will go. Whether or not they stay depends on a number of factors, but these are things that you can improve in on-site SEO, assisted of course by the web design and development team. Read on to find the three biggest peeves that are causing high bounce rates on your site and ho...

   SEO,WEB DESIGN     2015-11-20 02:33:07

  Python basics summary

Python is recommended by many people as the first language to be learned now. Even in some universities, it is the primary language to be taught to CS/CE students. To master this languages, we should understand some basics of it. Here we summarize some basics about this language. These basics include : string replacement with regular expression, traverse a directory, sort a list, remove duplication, dictionary ordering, dictionary, list, string conversion, date object manipulation, command line ...

   Python,Summary     2013-09-23 10:04:42

  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy.  Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk.  But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...

   DATA SECURITY,VPN     2020-01-30 07:33:29

  The Pitfall of WebSocket Disconnections Caused by Browser Power-Saving Mechanisms

Preface Recently, while using WebSocket (WS) connections, we encountered frequent disconnection issues, occurring hundreds of times per day for a single user. Although using the auto-reconnect feature of socket.io allowed us to quickly restore connections after disconnections, it did not guarantee that every reconnection would successfully receive WS messages. Therefore, we conducted several investigations and tests. Ultimately, we identified the root cause of the issue: the browser's power-savi...

   WEBSOCKET,JAVASCRIPT,POWER SAVING,TROUBLESHOOTING     2024-06-23 01:19:39

  5 Mistakes Developers Should Avoid before Launching Their API

Time is money in the API industry, and everyone wants to be timely for the API’s milestone event: its eventual launch. Delays in this event can be very costly, so the sooner the API can be integrated, the better. Many developers start their work knowing quite well that the clock is ticking. But prioritizing a quick launch—at the cost of everything else—can do a lot of damage in the long run. A rushed launch may result in unstable integration, a host of errors and bugs, lower en...

   TIPS,API DESIGN     2020-05-18 07:08:22